Identity Management Blog

A few months ago, I wrote a few blogs about trends in Healthcare and why these were making Identity a top of mind issue in the Healthcare sector.
Read More
Want to get insight from the experts on how to achieve success with your identity and access management program? Then join us for a lunch and learn where some smart folks from  Quest Software and Identropy will share insight on the key technologies and best practices that can help you improve your security and compliance posture while maximizing your ROI and avoiding common pitfalls that doom ...
In part 1 of this 2-part article, we described some of the symptoms that are found when the IAM team is perceived as the owner rather than the facilitator of access governance processes.  This article will provide some pointers and suggestions on how to re-focus the program.
Once upon a time, an organization was confronted with the fact its IT group was consumed in answering auditors' questions, as well finding and resolving issues found by auditors.  The IT group, responsible for the Identity and Access Management (IAM) team was constantly overworked and barely had any cycles to advance their IAM initiative outside of addressing questions and requests from internal ...
In part 1 of this two-part article, we provided the context and motivation for organizations to adopt a viable model for handling its IAM infrastructure operations. In this article, we will discuss options available to address this need.
For some time, we have been discussing the advantages of a co-sourced model for Identity and Access Management (IAM).  In this two-part article, I will focus on the first logical step for migrating from a traditional IAM deployment model towards a co-sourced, managed service model: IAM Operations Management.
Earlier this year, I published a blog article entitled Approaches to Identity-as-a-Service (IDaaS) for Enterprise Identity Management.  In this article, I will focus on the advantages of one of the approaches discussed: co-sourced IDaaS (a.k.a.  identity management co-sourcing), and, more specifically, the 3 model or "Hybrid: on-premise and in the cloud".
Or is it the reverse: Is IDaaS the future of MSSPs?  That is the question...
Following my testimony before NHIN earlier this year, I have met a number of visionaries in the healthcare sector who have been deeply involved in tackling some of the hardest and somewhat quixotesque challenges facing true electronic healthcare.
For some time now, we have been talking about identity activity monitoring. I alluded to it in a previous blog post. I will elaborate on it here.